Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
In this example, the intruder was connected to a corporate LAN and did a lot of work with another researcher on a different LAN. The backbone was set up in such a way that it took five hops and a 56-kbps line to get to the other research machines. By capturing routing information and having enough knowledge to change the routing metric information, the intruder altered the path so that his access became seemingly better through a backdoor connection. However, this modification resulted in all traffic from the intruder’s LAN being rerouted, saturating the backdoor link, and causing much of. | Chapter 7 Network security Foundations what is security cryptography authentication message integrity key distribution and certification Security in practice application layer secure e-mail transport layer Internet commerce SSL SET network layer IP security 7 Network Security 1 Friends and enemies Alice Bob Trudy Trudy well-known in network security world Bob Alice lovers want to communicate securely Trudy the intruder may intercept delete add messages 7 Network Security 2 What is network security Secrecy only sender intended receiver should understand msg contents o sender encrypts msg o receiver decrypts msg Authentication sender receiver want to confirm identity of each other Message Integrity sender receiver want to ensure message not altered in transit or afterwards without detection 7 Network Security